network security

12345678910
Across
  1. 2. intrusive software created to steal data and destroy or damage computers/systems
  2. 3. malicious software that gathers data about the user and forwards to a third party.
  3. 6. This attack occurs when someone pretends to be something that they are not.
  4. 8. This type of attack tries to alter system resources or affect their operations
  5. 9. emails that are sent pretending to be from companies asking for personal information.
  6. 10. this is used to hide the information content of data
Down
  1. 1. prevents normal use of communication or disrupts the network
  2. 4. a flaw or weakness used to attack a system or organization
  3. 5. makes use of information but does not affect system resources
  4. 7. someone who violates computer security